DropSmack: How cloud synchronization services render your corporate firewall worthless
|
|
|
- Gloria Willis
- 10 years ago
- Views:
Transcription
1 DropSmack: How cloud synchronization services render your corporate firewall worthless Jake Williams
2 Please complete the Speaker Feedback Surveys. Feedback Surveys This will help speakers to improve and for Black Hat to make better decisions regarding content and presenters for future events.
3 Why should you trust me? Why should you trust me? More than a decade of work in systems engineering, network defense, malware reverse engineering, penetration testing and forensics Conducing PhD level research in new techniques for botnet detection Two time winner of the DC3 Forensics challenge Developed a course on Cloud Forensics for a client So I ve had a LOT of time to research this Blah, blah, blah Cut the crap, show me the hack!
4 What s this about anyway? In case you might be in the wrong room Security of Cloud Synchronization services (Dropbox) How to use Dropbox to own a protected corporate network while completely bypassing network defenses How to use DropSmack malware to establish C2 and data exfiltration over Dropbox How to stop someone from doing it to you Dan Kaminsky is (probably) speaking somewhere else
5 Giant Honking Disclaimer We pick on Dropbox in this research And our proof of concept implant uses Dropbox Dropbox provides a command and control (C2) channel by design Mad props to Dropbox developers They set the standard in client side security among the products we tested Anything we demo with Dropbox can be done more easily to most other products We are not releasing zero-day attacks here The media will spin it that way though
6 Cloud Synchronization Implies more than just online backup Files placed in a folder on one participating machine are synchronized to all machines Via the cloud Infecting files destined for a backup site would be interesting too We can t get C2 from that But there s nothing like repeat infections from a single attack J
7 History of Insecurity Dropbox authentication horribly broken (2011) More on this later Dropbox no password day (2011) Dropbox Mobile file metadata in the clear (2011) Why aren t other products up here? Nobody was looking at the lower tier providers Don t worry, we are now Stay tuned for more fun!
8 Foundational Work Dark Clouds on the Horizon (2011) detailed the idea of using cloud synchronization software for covert data exfiltration Frank McClain and Derek Newton (2011) researched the Dropbox database format and published the details Dropbox promptly changed them Ruff and Ledoux (2012) reverse engineered Dropbox software to analyze security Again, Dropbox quickly changed internal details
9 A Little Case Study Our client, Massive Dynamic, requests a no holds barred penetration test Act like APT they said No problem, got that covered Long engagement time Completely black box
10 Standard Methods Fail Web portals No go Outdated patches on public facing services No go Social engineering Gets some basic IT info Campaign cut short by astute employees who inform security of the attempted trickery
11 Physical security is military grade And guys with big guns scare us Standard Methods Fail (2) This guy looks WAY too jumpy to try any physical pen testing approaches His thousand yard stare is a little disconcerting
12 Standard Methods Fail (3) Spam fails too We get some quick hits back to our BeEF server Some users are even running slightly older browsers But we never are able to establish any real C2 channel It s like something in the network is cutting out connections to our server Continue spamming campaign In case we get lucky Time for Plan B
13 Plan B No, not THAT PlanB! $25 and a college campus vending machine aren t getting us out of this mess
14 Social Network Analysis We find this guy s personal address He s the CIO Facebook tells us he helps organize fundraising for his kid s PTA Nothing like exploiting children to p0wn a target
15 Home We him some fundraising information at home and win Own the laptop Looking for VPN software on the laptop FAIL! Confidential corporate documents on the laptop Check WTF? These documents aren t really moving by or USB drive are they?
16 Dropbox We notice that all of the company documents are in the Dropbox folder And Dropbox.exe is in the process list Now we re getting somewhere Pull Dropbox databases to see what we can see Databases are encrypted Fail Could reverse engineer the Dropbox software to read the databases But
17 Ain t nobody got time for that!
18 Where are we? What we have so far A way to send files over Dropbox to devices the CIO uses What we want A running implant (with command and control) in the corporate network
19 This will require lots of beer. Time to brainstorm
20 Time to brainstorm No, I said LOTS of beer! That s more like it
21 Brainstorming complete With a blood alcohol level of.12 and a dose of inspiration, it hits me Dropbox can be used to infect the internal network AND be our C2 channel If the CIO has Dropbox installed on his corporate machine (behind the firewall) Since we have confidential corporate docs in the Dropbox folder, lets work from that assumption
22 First, we ll need new malware We could just deliver a standalone meterpreter But nothing else we delivered has been able to call out of the network We need malware that can use the Dropbox file synch service instead of traditional network based C2 Kind of like a dead drop *Pun definitely intended
23 DropSmack FTW So DropSmack was born DropSmack is new proof of concept malware designed to use files synchronized by Dropbox for C2 Guess what? This isn t fast Data exfiltration and command output are also sent via Dropbox synchronization Not surprisingly exfil isn t fast either Thanks to a recent Dropbox change, it s a lot faster Thanks Dropbox development team!
24 DropSmack Comms For the benefit of those that prefer a picture
25 DropSmack for long term use? DropSmack is slow and kludgy I d prefer not to use it long term Now that we have bi-directional C2, we can figure out how to get a more traditional C2 channel past the corporate firewall Being able to observe results from failures always helps Watch legitimate traffic leave the network from the inside
26 DropSmack Features DropSmack implements the following commands: PUT GET DELETE EXECUTE SLEEP MOVE We considered adding more, but this combination gets you everywhere you need to go Everything else is just gravy Yummm, gravy
27 Deploying DropSmack We can t do everything for you General steps (suggested): Embed DropSmack in a file the victim has already sync d Add some macro goodness Load file back to the machine you can access File automatically synchronizes Now all you have to do is wait for the victim to open the file on the internal network But
28 Ain t nobody got time for that!
29 Social Engineering (redux) Social engineering is much more likely to be successful when you have lots of background information Remember: 1. You know the file contents 2. The victim thinks they created the file It doesn t get much easier than that If you can t convince the subject to open the file, get out of the business!
30 DropSmack Demo Play video here.
31 Detecting this Tom Foolery IDS Worthless Firewall Mostly worthless* Antivirus Do I really need to say it? DLP Software Worthless too But for a whole lot more than just this Whitelisting Software Won t let the new application (DropSmack) execute
32 Next Generation Firewalls (NGFW) I can hear the CISO now: Certainly the shiny new next generation firewall will save us from this horror Sort of. In a 2012, more than 75% of respondents using NGFWs said that their workloads increased due to the installation of the firewall This sounds like IDS in the 90 s Still a black and white decision on whether to allow Dropbox Can t surgically filter content with an NGFW
33 Do you allow synch software? All of the detection methods we ll cover focus on finding illicit synchronization software installations Remember, this channel exists by design If you allow the software, you are implicitly allowing the covert channel with it
34 Detection strategies that mostly suck Dropbox uses LanSync TCP and UDP port Look for DNS requests to servers related to synchronization services Let me know how this works Block access to Amazon S3 (Dropbox back-end) This isn t really feasible, breaks other stuff Scan user profile directories for illicit synchronization software installations Remember, these programs install into user profiles so no UAC
35 Better detection strategies? In short, no Again, you take the vulnerability with the convenience Time to talk to management and find out what the policy on these services really should be
36 Future work Need to be able to read and extract information from Dropbox configs Those damn encrypted databases again DropSmack currently assumes a default synchronization folder location Changing the default breaks this version of DropSmack
37 Future work (2) Dropbox issues popup notifications when new files are added, deleted, or changed remotely Users probably appreciate this I don t Need to adopt strategies to get rid of these popups since we create a lot of them
38 Future work (3) Build proof of concept malware that uses other synchronization services Dropbox users shouldn t have all the pain Most other services we ve looked at don t use encrypted databases Takes away all the challenges we have with Dropbox Note to vendors: Encrypt your databases It makes my job much harder
39 Future work (4) Extract login information for web front ends from client side databases This would allow us to take the laptop out of the loop after the initial compromise Or entirely if we got credentials some other way This is an active research area for us
40 Conclusion DropSmack isn t rocket science Almost anyone could have written it If you are a pen tester who finds this useful, glad I could be of help The real point is to demonstrate the vulnerability that file synchronization applications represent If you are comfortable with the vulnerability, fine This started out as a project to help our clients make an informed decision about risk
41 Please complete the Speaker Feedback Surveys. Feedback Surveys This will help speakers to improve and for Black Hat to make better decisions regarding content and presenters for future events.
42 Questions? Thanks for your time and attention I m happy to answer any questions you may have Jake Williams [email protected]
DropSmack: How cloud synchronization services render your corporate firewall worthless
DropSmack: How cloud synchronization services render your corporate firewall worthless Jake Williams CSRgroup Computer Security Consultants jwilliams@csr- group.com BlackHat Europe 2013 Abstract: Cloud
Detecting data loss from cloud sync applications
Detecting data loss from cloud sync applications Jake Williams CSRgroup Consultants @MalwareJake [email protected] Cloud Synchronization Data Loss - 2013 Jake Williams 1 BLUF Just to level set expectations.
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
Protect Yourself. Who is asking? What information are they asking for? Why do they need it?
Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
Software for Ministry. Remote Access FAQ s
Software for Ministry PO Box 1415 Cleburne, TX 76033 817 219 1243 www.softwareforministry.com Remote Access FAQ s These notes provide a basic explanation of what is involved to enable remote access to
Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005
Brazosport College VPN Connection Installation and Setup Instructions Draft 2 March 24, 2005 Introduction This is an initial draft of these instructions. These instructions have been tested by the IT department
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
Cisco IPS Tuning Overview
Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.
How We're Getting Creamed
ed Attacks How We're Getting Creamed By Ed Skoudis June 9, 2011 ed Attacks - 2011 Ed Skoudis 1 $ cut -f5 -d: /etc/passwd grep -i skoudis Ed Skoudis Started infosec career at Bellcore in 1996 working for
A Case for Managed Security
A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction
High Speed Internet - User Guide. Welcome to. your world.
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.
NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
New Systems and Services Security Guidance
New Systems and Services Security Guidance Version Version Number Date Author Type of modification / Notes 0.1 29/05/2012 Donna Waymouth First draft 0.2 21/06/2012 Donna Waymouth Update re certificates
Basic Computer Security Part 2
Basic Computer Security Part 2 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University Welcome
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview
IS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection
IS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection Description Lab flow At the end of this lab, you should be able to Discover how to harness the power and capabilities
1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.
Employee Security Awareness Survey Trenton Bond [email protected] Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is
Why The Security You Bought Yesterday, Won t Save You Today
9th Annual Courts and Local Government Technology Conference Why The Security You Bought Yesterday, Won t Save You Today Ian Robertson Director of Information Security Michael Gough Sr. Risk Analyst About
Integrating Single Sign-on Across the Cloud By David Strom
Integrating Single Sign-on Across the Cloud By David Strom TABLE OF CONTENTS Introduction 1 Access Control: Web and SSO Gateways 2 Web Gateway Key Features 2 SSO Key Features 3 Conclusion 5 Author Bio
10 steps to better secure your Mac laptop from physical data theft
10 steps to better secure your Mac laptop from physical data theft Executive summary: This paper describes changes Mac users can make to improve the physical security of their laptops, discussing the context
AdwareMedic. About AdwareMedic... 2. How to use AdwareMedic... 3. Frequently Asked Questions... 7. Version History... 9 License Agreement...
AdwareMedic http://www.adwaremedic.com [email protected] About AdwareMedic... 2 System Requirements... 2 Limitations... 2 How to use AdwareMedic... 3 Scan for Adware... 4 Optional items... 5 Firefox
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Cleaning Up Your Outlook Mailbox and Keeping It That Way ;-) Mailbox Cleanup. Quicklinks >>
Cleaning Up Your Outlook Mailbox and Keeping It That Way ;-) Whether you are reaching the limit of your mailbox storage quota or simply want to get rid of some of the clutter in your mailbox, knowing where
October Is National Cyber Security Awareness Month!
(0 West Virginia Executive Branch Privacy Tip October Is National Cyber Security Awareness Month! In recognition of National Cyber Security Month, we are supplying tips to keep you safe in your work life
I Hunt Penetration Testers!
I Hunt Penetration Testers! More Weaknesses in Tools and Procedures Wesley McGrew, Ph.D. Distributed Analytics and Security Institute Mississippi State University http://mcgrewsecurity.com [email protected]
How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security
How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security PART 1 - COMPLIANCE STANDARDS PART 2 SECURITY IMPACT THEMES BUILD A MODEL THEMES MONITOR FOR FAILURE THEMES DEMONSTRATE
CEFNS Web Hosting a Guide for CS212
CEFNS Web Hosting a Guide for CS212 INTRODUCTION: TOOLS: In CS212, you will be learning the basics of web development. Therefore, you want to keep your tools to a minimum so that you understand how things
Cybersecurity: An Innovative Approach to Advanced Persistent Threats
Cybersecurity: An Innovative Approach to Advanced Persistent Threats SESSION ID: AST1-R01 Brent Conran Chief Security Officer McAfee This is who I am 2 This is what I do 3 Student B The Hack Pack I used
How To Protect Your Data From Being Stolen
DATA SECURITY & PCI DSS COMPLIANCE PROTECTING CUSTOMER DATA WHAT IS PCI DSS? PAYMENT CARD INDUSTRY DATA SECURITY STANDARD A SET OF REQUIREMENTS FOR ANY ORGANIZATION OR MERCHANT THAT ACCEPTS, TRANSMITS
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
3 Email Marketing Security Risks. How to combat the threats to the security of your Email Marketing Database
3 Email Marketing Security Risks How to combat the threats to the security of your Email Marketing Database Email Marketing Guide June 2013 Security Threats PROTECTING YOUR EMAIL DATABASE FROM HACKERS
Penetration Testing Walkthrough
Penetration Testing Walkthrough Table of Contents Penetration Testing Walkthrough... 3 Practical Walkthrough of Phases 2-5... 4 Chose Tool BackTrack (Armitage)... 5 Choose Target... 6 Phase 2 - Basic Scan...
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
How to get 2 Cents Clicks by Colin Klinkert
How to get 2 Cents Clicks by Colin Klinkert Hi, Colin Klinkert here at CKTV, that you can find at http://www.colinklinkert.com. This video is a very exciting one where we re going to talk about how you
Yahoo Attack. Is DDoS a Real Problem?
Is DDoS a Real Problem? Yes, attacks happen every day One study reported ~4,000 per week 1 On a wide variety of targets Tend to be highly successful There are few good existing mechanisms to stop them
MDaemon configuration recommendations for dealing with spam related issues
Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did
2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.
2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program. Entry Name HFA Submission Contact Phone Email Qualified Entries must be received by
Security A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
What you need to know to keep your computer safe on the Internet
What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security
Streamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
What is Penetration Testing?
White Paper What is Penetration Testing? An Introduction for IT Managers What Is Penetration Testing? Penetration testing is the process of identifying security gaps in your IT infrastructure by mimicking
How users bypass your security!
How users bypass your security! IT Days Security issues 20 th November 2014 Tom Leclerc, Security Consultant SAGS - Security Audits and Governance Services, a Telindus Security department Classification:
Introduction to Email Security by Brandon, deliverability engineer
Introduction to Email Security by Brandon, deliverability engineer We re a paranoid bunch at MailChimp. We proudly wear tinfoil hats, we have secret hideout rooms with steel walls, and we have fireman
Project 2: Penetration Testing (Phase II)
Project 2: Penetration Testing (Phase II) CS 161 - Joseph/Tygar November 17, 2006 1 Edits If we need to make clarifications or corrections to this document after distributing it, we will post a new version
Small Business Server Part 2
Small Business Server Part 2 Presented by : Robert Crane BE MBA MCP [email protected] Computer Information Agency http://www.ciaops.com Agenda Week 1 What is SBS / Setup Week 2 Using & configuring SBS
Exchange-based email. Types of email. Why use Exchange for email?
Exchange-based email Types of email POP3 Exchange Lotus Notes Squirrel mail Pine They are all pretty basic and limited except Exchange email. Lotus Notes has lots of functionality, but it s a big pain
Basic Security Considerations for Email and Web Browsing
Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable
RSA Security Anatomy of an Attack Lessons learned
RSA Security Anatomy of an Attack Lessons learned Malcolm Dundas Account Executive John Hurley Senior Technology Consultant 1 Agenda Advanced Enterprise/ Threats The RSA Breach A chronology of the attack
Introduction. Keeping Data Safe and Secure. Topics of Interest. Disclaimer. How Is Data Lost In General? Reasons for Data Loss by 3 rd Parties
Introduction Keeping Data Safe and Secure with Encryption and Online Services This session will look at two aspects of protecting your TRIO program s data through the use of data encryption and online
Agenda. 3 2012, Palo Alto Networks. Confidential and Proprietary.
Agenda Evolution of the cyber threat How the cyber threat develops Why traditional systems are failing Need move to application controls Need for automation 3 2012, Palo Alto Networks. Confidential and
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
FREE REPORT: Answers To The Top 5 Questions Business Owners Have About Cloud Computing
FREE REPORT: Answers To The Top 5 Questions Business Owners Have About Cloud Computing Discover What Most IT Consultants Don t Know Or Won t Tell You About Moving Your Company s Network To The Cloud By
Denial of Service Attacks
(DoS) What Can be DoSed? First Internet DoS Attack The TCP State Diagram SYN Flooding Anti-Spoofing Better Data Structures Attacking Compact Data Structures Generic Solution SYN Cookies It s Not Perfect
Don t Click That Link and other security tips. Laura Perry Jennifer Speegle Mike Trice
Don t Click That Link and other security tips Laura Perry Jennifer Speegle Mike Trice About Us Laura Perry Information Security Jennifer Speegle Firewall Administrator Mike Trice Network Engineer Mail
How To Test For Security On A Network Without Being Hacked
A Simple Guide to Successful Penetration Testing Table of Contents Penetration Testing, Simplified. Scanning is Not Testing. Test Well. Test Often. Pen Test to Avoid a Mess. Six-phase Methodology. A Few
Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.
Internet Quick Start Guide Get the most out of your Midco internet service with these handy instructions. 1 Contents Internet Security................................................................ 4
The Sophisticated Attack Myth: Hiding Unsophisticated Security Programs: The Irari Rules of Classifying Sophisticated Attacks
SESSION ID: EXP-F03 The Sophisticated Attack Myth: Hiding Unsophisticated Security Programs: The Irari Rules of Classifying Sophisticated Attacks Ira Winkler, CISSP President Secure Mentem @irawinkler
Best Practices for Trialing the Intronis Cloud Backup and Recovery Solution
Best Practices for Trialing the Intronis Cloud Backup and Recovery Solution Intronis Cloud Backup and Recovery is a file based backup application that allows users to back up their critical data to the
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Troubleshooting / FAQ
Troubleshooting / FAQ Routers / Firewalls I can't connect to my server from outside of my internal network. The server's IP is 10.0.1.23, but I can't use that IP from a friend's computer. How do I get
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark Villinski @markvillinski
TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY Mark Villinski @markvillinski Why do we have to educate employees about cybersecurity? 2014 Corporate Threats Survey 94% of business s suffered one
EURECOM VPN SSL for students User s guide
EURECOM VPN SSL for students User s guide Table of Contents Introduction... 2 Login process... 2 Portail main page... 2 Prerequisite... 2 RSA SecurId software token... 3 First usage of RSA SecurID token...
Desktop and Laptop Security Policy
Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious
The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.
The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. By completing this module and the quiz, you will receive credit for CW 170, which is required
Remote Access Securing Your Employees Out of the Office
Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction
Penetration Testing Ninjitsu 2: Crouching Netcat, Hidden Vulnerabilities. By Ed Skoudis
Penetration Testing Ninjitsu 2: Crouching Netcat, Hidden Vulnerabilities By Ed Skoudis Copyright 2008, SANS Version 2Q08 Network Pen Testing & Ethical Hacking - 2008, Ed Skoudis 1 This Webcast and the
Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data
Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
ANDRA ZAHARIA MARCOM MANAGER
10 Warning Signs that Your Computer is Malware Infected [Updated] ANDRA ZAHARIA MARCOM MANAGER MAY 16TH, 2016 6:05 Malware affects us all The increasing number of Internet users worldwide creates an equal
How to prevent computer viruses in 10 steps
How to prevent computer viruses in 10 steps Following on from our advice on how to keep your online data secure, we ve created a follow-up outlining how you can keep your computer itself safe. Not only
Metasploit The Elixir of Network Security
Metasploit The Elixir of Network Security Harish Chowdhary Software Quality Engineer, Aricent Technologies Shubham Mittal Penetration Testing Engineer, Iviz Security And Your Situation Would Be Main Goal
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER
WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and
13 Ways Through A Firewall What you don t know will hurt you
Scientech 2013 Symposium: Managing Fleet Assets and Performance 13 Ways Through A Firewall What you don t know will hurt you Andrew Ginter VP Industrial Security Waterfall Security Solutions andrew. ginter
NERC CIP Ports & Services. Part 2: Complying With NERC CIP Documentation Requirements
NERC CIP Ports & Services Part 2: Complying With NERC CIP Documentation Requirements White Paper FoxGuard Solutions, Inc. November 2014 Defining Ports And Services In part 2 of our Ports and Services white
Application Firewalls
Application Moving Up the Stack Advantages Disadvantages Example: Protecting Email Email Threats Inbound Email Different Sublayers Combining Firewall Types Firewalling Email Enforcement Application Distributed
STABLE & SECURE BANK lab writeup. Page 1 of 21
STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth
User Questions and Answers from the 8/22/2014 Iowa TIER Support Webinar
We had a wonderful turnout for our inaugural Iowa TIER Support Webinar. Many thanks to all who attended! Along with this excellent turnout were lots of great questions asked by our users. Here is a recap
G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy
For Public Use G/On Basic Best Practice Reference Guide Version 6 Make Connectivity Easy 2006 Giritech A/S. 1 G/On Basic Best Practices Reference Guide v.6 Table of Contents Scope...3 G/On Server Platform
13 Ways Through A Firewall
Industrial Control Systems Joint Working Group 2012 Fall Meeting 13 Ways Through A Firewall Andrew Ginter Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright
The Nuts and Bolts of Autodesk Vault Replication Setup
The Nuts and Bolts of Autodesk Vault Replication Setup James McMullen Autodesk, Inc PL4700-V Has your company decided to move toward a replicated Autodesk Vault software environment? Does your company
